Mobile Working Group

Fill out the form below to view this webinar!

Name (First and Last)

Email Address

Company

Position

Introduction to the Mobile Working Group

Over the past several years, enterprise adoption of mobile, and especially BYOD, has redefined enterprise mobility. It has also opened up a series of difficult-to-solve security and compliance concerns. Common among most of these concerns is an eventual realization that taking control over a set of constantly changing devices not owned and paid for by the enterprise is fraught with legal, privacy, and employee relations challenges. For this reason, enterprises have begun to shift focus from managing and protecting mobile devices to protecting mobile data.

The CSA Mobile Working Group will focus on short, regularly updated research that is both concrete and immediately actionable in CSA member organizations.

Scope and Responsibilities

The working group is chartered to research:

Evolutionary shift from management of mobile devices to management of mobile data

Security and audit-ability traveling as an integrated part of corporate data, enabling data security anywhere.

Augmentation of enterprise identity and authentication with omnipresent mobile devices.

The impact of public cloud applications on mobility and mobile data protection.

Mobile Working Group Leadership

Mobile Co-chairs

Rich Campagna

SVP of Products and Marketing, Bitglass

Rich Campagna is SVP of Products and Marketing at Bitglass where he drives product management and marketing. Prior to becoming an integral team member at Bitglass in April 2013, Rich was senior director of product management at F5 Networks, responsible for access security. Rich gained valuable experience in product management and sales engineering at Juniper and Sprint before F5. Rich received an MBA from the UCLA Anderson School of Management and a BS in electrical engineering from Pennsylvania State University.

Nader Henein

Regional Director, Advanced Cyber Assurance

Throughout my career, I have led the design & implementation of complex, secure, business focused systems. I firmly believe in getting my hands dirty and in the importance of working side by side with a motivated team. I am a lifelong advocate of data governance and privacy with two decades of experience in developing and managing a cohesive information lifecycle to support the business.

I have worked in a wide range of organizations kinking off with two startups where I helped shape the strategy and learned to be prepared for everything and anything. In large multinationals with rapidly changing requirements, I believed in developing processes to scale and streamline growth; I am practical, pragmatic and a natural problem solver and I will do my best to bring these traits to our body of work.

Connect with Us

Mobile Working Group Downloads

The Mobile Application Security Testing (MAST) Initiative is a research which aims to help organizations and individuals reduce the possible risk exposures and security threat in using mobile applications. MAST aims define a framework for secure mobile application development, achieving privacy and security by design. Implementation of MAST will result in clearly articulated recommendations and…

Mobile applications are becoming an integral part of not just modern enterprises but also of human existence and a huge part of this shift is due to the emergence of cloud computing. The Mobile Application Security Testing initiative will aim to create a safer cloud ecosystem for mobile applications by creating systematic approaches to application…

Mobile applications are becoming an integral part of not just modern enterprises but also of human existence and a huge part of this shift is due to the emergence of cloud computing. The Mobile Application Security Testing initiative will aim to create a safer cloud ecosystem for mobile applications by creating systematic approaches to application…

Mobile devices empower employees to do what they need to do — whenever and wherever. People can work and collaborate “in the field” with customers, partners, patients or students and each other. But they need to be supported with always current operational processes and information, whether from apps, the Internet, or documents from other people.

This website uses cookies to improve functionality and performance. If you continue browsing the site, you are giving implied consent to the use of cookies on this website. See our Cookie Policy for details.